Skip to main content

WP-toolkit has vulnerablities?

Comments

8 comments

  • cPanelPeter cPanel Staff
    Hello ankeshanand, Thank you for posting this. I've checked a couple of our servers and those logs are perfectly normal and not indicative of any security issue in WordPress Toolkit. However, it is possible that your server is indeed compromised at the root level. Please consider opening a ticket with us and one of our L3 analysts (and myself) will be happy to further investigate this for you.
    0
  • letaza
    Hello, did you find out the cause in the end? We recently had similar case happen to us
    0
  • cPanelAnthony
    Hello, did you find out the cause in the end? We recently had similar case happen to us

    Hello! It appears the previous user never ended up opening a ticket. Would you be able to do so using the link in my signature or by asking your web hosting provider to help? If you do so, please provide the ticket ID here. Thanks!
    0
  • ankeshanand
    Hello, did you find out the cause in the end? We recently had similar case happen to us

    I asked the owner and he already abandoned the server because it was no use to him. But I am preety sure that was because of WP-toolkit and I do have Logs downloaded. Thats because CageFS limits all users but still there was a sudo elevation just after wp-toolkit processes. Morever, Imunify was on totally Strict mode with WAF and PHP kill mode so no processes can bypass. The root password was of 32 Digits with SSH Password authorization disabled and No bruteforce noticed in cPhulk or Imunify360. That leaves only one thing, i.e Sudo user elevation which gave root access to whoever hacked it. Also, recently he received a spoofed Email asking for Money..... 5000USD in BTC! :-p No one will give away that kind of money when they find backups....
    0
  • cPanelAnthony
    Thank you for confirming the resolution!
    0
  • cPanelPeter cPanel Staff
    Just to be clear here, WordPress Toolkit does use sudo to run certain tasks as the user. It has to do that. It does not mean they are escalated to root, just that it is connected as the user to perform the tasks needed. It has to do with the environment variables within each user as it pulls those variables in. Therefore they must be run as the user and not as root.
    0
  • Shoss
    I am very skeptical of WP toolkit taking this route of using sudo. It is just another point of failure in the mix. It didn't need sudo to install WordPress. Seeing the number of major bugs WP Toolkit has, especially incompatibility with disable_functions in PHP 8, that exists since the days of Plesk in 2019, I am not sure it is a well thought out software.
    Just to be clear here, WordPress Toolkit does use sudo to run certain tasks as the user.

    0
  • cPanelPeter cPanel Staff
    Hello, Thank you for the update. I think you may have misunderstood part of my reply. When I said, "WordPress Toolkit does use sudo to run certain tasks as the user...", that's what I meant. It has to impersonate the user to run those commands. It does not impersonate root directly but does use the wp-toolkit user in order to perform file operations and run processes (e.g. wp-cli.phar) on a WordPress instance as the specified user. Additionally, your statement that WordPress Toolkit doesn't need sudo to install WordPress is incorrect. It does use sudo to change to the user in question and then performs the install using the wp-cli utility which runs under the wp-toolkit user. You also stated this: Seeing the number of major bugs WP Toolkit has, especially incompatibility with disable_functions in PHP 8, that exists since the days of Plesk in 2019,... Can you please be more specific? What bugs exactly? Have you reported these defects? I'm not aware of any defects that specifically mention PHP 8 and disable_functions. WordPress Toolkit v5.3 was the first version to support PHP 8. It came out on 2/15/2021, not in 2019. The original poster for this thread mentioned that several of his accounts showed REMOVED and he was sure it was related to WordPress Toolkit and provided log files. But what we stated was that the log files were normal and not any kind of indication that this was a root compromise or that it was directly involved in his issue. However, I offered to check and requested a ticket be opened. To date, that has not occurred. The offer still stands, if you or anyone believes that WordPress Toolkit is to blame for a security issue on your server, feel free to open a ticket and our L3 analysts and myself will be happy to review things for you.
    0

Please sign in to leave a comment.